740 likes | 760 Views
Learn about TCP/IP protocols and standards used for networking in Windows. Step-by-step guide to connecting and securing a network with multifunction routers. Understand layers of network communication and how devices communicate using TCP/IP.
E N D
A+ Guide to IT Technical Support, 9th Edition Chapter 14 Connecting to and Setting up a Network
Objectives • Explain the TCP/IP protocols and standards Windows uses for networking • Connect a computer to a wired or wireless network • Configure and secure a multifunction router on a local network A+ Guide to IT Technical Support, 9th Edition
Understanding TCP/IP and Windows Networking • Client/server applications • Two computers and two applications involved • Communication occurs three levels • Hardware, operating system, application • Dependent on one computer addressing the other Figure 14-1 A web browser (client software) requests a web page from a web server (server software); the web server returns the requested data to the client A+ Guide to IT Technical Support, 9th Edition
Layers of Network Communication • When two devices communicate, they must use the same protocols (language) • Almost all networks today use a group or suite of protocols known as TCP/IP (Transmission Control Protocol/Internet Protocol) • Communication between two computers happens in layers • Application passes a request to the OS, which passes the request to the network card and then onto the network A+ Guide to IT Technical Support, 9th Edition
Layers of Network Communication • Level 1: Hardware level • Root level of communication • Wireless or network cables • Phone lines or TV cable lines • Includes the network adapter (NIC) and MAC address • MAC (media access control) address is a unique 48-bit hexadecimal number hard-coded on the card by the manufacturer • Also known as hardware address, physical address, adapter address, or Ethernet address • Used to locate a computer on a local area network A+ Guide to IT Technical Support, 9th Edition
Layers of Network Communication Figure 14-3 This Gigabit Ethernet adapter by Intel uses a PCIe x1 slot A+ Guide to IT Technical Support, 9th Edition
Layers of Network Communication • Level 2: Operating system level • Manages communication between itself and another computer using TCP/IP • Uses IP addressing Figure 14-4 Computers on the same LAN use MAC addresses to communicate, but computers on different LANs use IP addresses to communicate over the Internet A+ Guide to IT Technical Support, 9th Edition
Layer of Network Communication • Layer 2: Operating system level: (cont’d) • IP address • 32-bit or 128-bit number that is assigned to a network connection • Used to find computers on networks and subnetworks, including the Internet A+ Guide to IT Technical Support, 9th Edition
Layers of Network Communication • Level 3: Application level • Client communicates with server applications • Such as a web server or email server • Port number (port or port address) • Uniquely identifies a computer application • Port number is added to IP address • IP address followed by a colon and port number • E-mail example: 36.60.30.5:25 • Web server example: 136.60.30.5:80 A+ Guide to IT Technical Support, 9th Edition
Layers of Network Communication Figure 14-5 Each server running on a computer is addressed by a unique port number A+ Guide to IT Technical Support, 9th Edition
How IP Addresses Get Assigned • An IP address has 32 or 128 bits • Internet Protocol version 4 (IPv4) – uses a 32-bit address to identify a network connection • Currently a shortage of IPv4 IP addresses • Internet Protocol version 6 (IPv6) was created partly due to the shortage of IPv4 addresses • Uses a 128-bit IP address • Internet Assigned Numbers Authority (IANA) is responsible for keeping track of assigned IP addresses A+ Guide to IT Technical Support, 9th Edition
How IP Addresses Get Assigned • A MAC address is embedded on a network adapter at a factory • IP addresses are assigned manually or by software • Static IP address: manually and permanently assigned to a computer or device • Dynamic IP address: assigned by a server each time the device connects to the network • A DHCP (dynamic host configuration protocol) server assigns addresses to a DHCP client that is requesting an address • DHCPv6 server serves up IPV6 addresses A+ Guide to IT Technical Support, 9th Edition
How IPv4 IP Addresses Are Used • IP address: 32 bits long, made up of 4 groups, each 8 bits long • Four decimal numbers separated by periods • 72.56.105.12 • Largest possible 8-bit number • 11111111 (255 decimal) • Largest possible decimal IP address • 255.255.255.255 • 11111111.11111111.11111111.11111111 binary • Octet: each of the four decimal numbers • 0 to 255 A+ Guide to IT Technical Support, 9th Edition
How IPv4 IP Addresses Are Used • Some IP addresses are reserved and should not be assigned to a device on a network Table 14-1 Reserved IP addresses A+ Guide to IT Technical Support, 9th Edition
How IPv4 IP Addresses Are Used • IP address identifies network and host • Subnet Masks • The subnet mask identifies which part of an IP address is the network id and which is the host id • Subnet masks help a device know if an IP address is part of it’s network or belongs to another A+ Guide to IT Technical Support, 9th Edition
How IPv4 IP Addresses Are Used Figure 14-7 A host (router, in this case) can always determine if an IP address is on its network A+ Guide to IT Technical Support, 9th Edition
How IPv4 IP Addresses Are Used • Subnet masks • String of ones followed by a string of zeros • Example: • IP address of a computer is 201.18.20.160 with a subnet mask of 11111111.11111111.00000000.00000000 • Subnet masks tells Windows that first 16 bits (two octets) of the IP address is the network ID • Network ID is 201.18.0.0 and host id is 20.160 • Might be written as 201.18.20.160/16 where the /16 means the first 16 bits identify the network (known as CIDR notation) A+ Guide to IT Technical Support, 9th Edition
How IPv4 IP Addresses Are Used • Public IP addresses: available to the Internet • Private IP addresses: used on private network • Computers unable to lease an IP address from a DHCP server, it generates its own Automatic Private IP Address (APIPA) • IEEE recommends using the following IP addresses: • 10.0.0.0 through 10.255.255.255 • 172.16.0.0 through 172.31.255.255 • 192.168.0.0 through 192.168.255.255 A+ Guide to IT Technical Support, 9th Edition
How IPv4 IP Addresses Are Used • NAT (Network Address Translation) • Use router or gateway device with NAT (Network Address Translation) redirection for Internet access • Substitutes the public IP address of the router for the private IP address of a computer that needs to communicate on the Internet • The ipconfig command can be used to show IP addresses assigned to network connections A+ Guide to IT Technical Support, 9th Edition
How IPv6 IP Addresses Are Used • IPv6 address has 128 bits written as 8 blocks of hexadecimal numbers separated by colons • Example: 2001:0000:0B80:0000:0000:00D3:9C5A:00CC • Each block is 16 bits • Leading 0s in a 4-character hex block can be eliminated. For example, the IP address above: • 2001:0000:B80:0000:0000:D3:9C5A:CC • If blocks contain all zeros, they can be written as double colons. From IP address above: • 2001:0000:B80::D3:9C5A:CC • Only one set of double colons is used A+ Guide to IT Technical Support, 9th Edition
How IPv6 IP Addresses Are Used • Terms used in the IPv6 standards: • Link (local link):a local area network (LAN) or wide area network (WAN) bound by routers • Node: any device that connects to a network • Interface: node’s attachment to a link • Can be logical or physical • Logical attachment is used for tunneling (used by IPv6 to transport IPv6 packets over an IPv4 network) • Interface ID: last 64 bits or 4 blocks of an IP address • Neighbors: two or more nodes on the same link A+ Guide to IT Technical Support, 9th Edition
How IPv6 IP Addresses Are Used • Two common tunneling protocols for IPv6 packets to travel over an IPv4 network: • ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) • Teredo – addresses intended to be used by this protocol always begin with the same 32-bit prefix (called fixed bits) which is 2001 A+ Guide to IT Technical Support, 9th Edition
How IPv6 IP Addresses Are Used • Three types of IPv6 addresses: • Unicast address: packets are delivered to a single node on a network • Multicast address: packets are delivered to all nodes on a network • Anycast address: used by routers; identifies multiple destinations and packets are delivered to the closest destination A+ Guide to IT Technical Support, 9th Edition
How IPv6 IP Addresses Are Used Table 14-3 Address prefixes for types of IPv6 addresses A+ Guide to IT Technical Support, 9th Edition
How IPv6 IP Addresses Are Used • There are three types of unicast addresses: • Link-local unicast (link-local or local address): can be used for communicating with nodes in same link • Most begin with FE80::/64 • Begins FE80 followed by enough zeros to make 64 bits • Unique local address (ULA): private address used by network administrators when subnetting a network • Global unicast (global address): can be routed on the Internet • First 48 bits is the Global Routing Prefix (assigned by ISP) A+ Guide to IT Technical Support, 9th Edition
How IPv6 IP Addresses Are Used Figure 14-12 Three types of IPv6 addresses A+ Guide to IT Technical Support, 9th Edition
Subnets • IPv6 uses subnetting but doesn’t need a subnet mask • Subnet ID that identifies a subnet is part of the IPv6 address • Subnet ID is the 16 bits following the first 48 bits of the address A+ Guide to IT Technical Support, 9th Edition
View IP Address Settings • Use the ipconfig command in a command prompt window to show the IPv4 and IPv6 addresses assigned to all network connections • IPv6 addresses are followed by a % sign and a number • The number is called the zone ID or scope ID and is used to identify the interface in a list of interfaces of a computer A+ Guide to IT Technical Support, 9th Edition
View IP Address Settings Figure 14-13 The ipconfig command showing IPv4 and IPv6 addresses assigned to this computer A+ Guide to IT Technical Support, 9th Edition
Character-based Names Identify Computers and Networks • Character-based names: substitute for IP addresses • Host name (computer name): name of a computer • Workgroup name: identifies a workgroup • Domain name: identifies a network • Fully qualified domain name (FQDN): identifies computer and network to which it belongs • Uses name resolution • DNS server finds IP address when the FDQN known • Windows first looks in DNS cache, if not found Windows turns to DNS server to find IP address (called the DNS client) A+ Guide to IT Technical Support, 9th Edition
TCP/IP Protocol Layers Figure 14-16 How software, protocols, and technology on a TCP/IP network relate to each other A+ Guide to IT Technical Support, 9th Edition
TCP/IP Protocols Used By The OS • TCP (Transmission Control Protocol) • Connection-oriented protocol • Uses protocols at IP layer to establish a session • When a TCP packet reaches destination, an acknowledgement (ack) is sent back to the source • If TCP source does not receive ack, it resends the data • UDP (User Datagram Protocol) • Connectionless protocol (best-effort) • Used for broadcasting and streaming video • Also used to monitor network traffic A+ Guide to IT Technical Support, 9th Edition
TCP/IP Protocols Used By The OS Figure 14-17 TCP guarantees delivery by requesting an acknowledgement A+ Guide to IT Technical Support, 9th Edition
TCP/IP Protocols Used By Applications • HTTP (Hypertext Transfer Protocol) • HTTPS (HTTP secure) protocol • Encrypts and decrypts data before sent and processed • SMTP (Simple Mail Transfer Protocol) • Used to send e-mail message • POP and IMAP • Used for delivery of email message • Telnet • Used to remotely control a computer A+ Guide to IT Technical Support, 9th Edition
TCP/IP Protocols Used By Applications • LDAP (Lightweight Directory Access Protocol) • Used by clients when an application needs to query a database • SMB (Server Message Block) • Used by Windows to share files and printers • AFP (Apple Filing Protocol) • File access protocol used by early editions of Mac OS • CIFS (Common Internet File System) aka SMB2 • Cross-platform version of SMB used between Windows, Linux, Mac OS and other OSs A+ Guide to IT Technical Support, 9th Edition
TCP/IP Protocols Used By Applications • FTP (File Transfer Protocol) • Transfer files between two computers • Secure FTP (SFTP) uses SSH encryption • SSH (Secure Shell) • Used to pass login information to a remote computer and control that computer over a network • SNMP (Simple Network Management Protocol) • Used to monitor network traffic • RDP (Remote Desktop Protocol) • Used to connect to and control a remote computer A+ Guide to IT Technical Support, 9th Edition
Connecting A Computer To A Network • Connecting a computer to a network • Quick and easy in most situations • Topics covered • Connecting to a network using Ethernet, wireless, dial-up connections, and a VPN A+ Guide to IT Technical Support, 9th Edition
Connect To an Ethernet Wired or Wireless Wi-Fi Local Network • Steps • 1. Install network adapter and drivers • 2. For a wired network: • Connect network cable to Ethernet RJ-45 port and network port (wall jack, router, switch) • Verify lights • Windows should automatically configure connection • For a wireless network: • In Windows 8/7 desktop, click the network icon and select a wireless network, click Connect • If network is secured, must enter a security key A+ Guide to IT Technical Support, 9th Edition
Connect To an Ethernet Wired or Wireless Wi-Fi Local Network • Steps (cont’d) • 3. Open browser and verify Internet connectivity • For some hotspots, a home page appears and you must enter a code or agree to the terms of use • For wireless connections, view the status of the connection • Use Control Panel to open Network and Sharing Center • Click Change adapter settings and the Network Connections window appears A+ Guide to IT Technical Support, 9th Edition
Connect To an Ethernet Wired or Wireless Wi-Fi Local Network Figure 14-23 The Network Connections window can be used to repair broken connections A+ Guide to IT Technical Support, 9th Edition
Connect To a Wireless WAN (Cellular) Network • Needed to connect to a wireless wide area network (WWAN): • Hardware and software • Subscriber Identification Module (SIM) card: flash card that contains all information you need to connect to a cellular network: • Cellular network technologies: • GSM (Global System for Mobile Communications) • CDMA (Code Division Multiple Access) • Long Term Evolution (LTE) and Voice over LTE (VoLTE) A+ Guide to IT Technical Support, 9th Edition
Connect To a Wireless WAN (Cellular) Network Figure 14-26 A SIM card contains proof that your device can use a cellular network A+ Guide to IT Technical Support, 9th Edition
Connect To a Wireless WAN (Cellular) Network Figure 14-27 Tether your cell phone to your laptop using a USB cable • Options for hardware and software: • Use an embedded mobile broadband modem • Tether your cell phone to your computer • Use a USB broadband modem A+ Guide to IT Technical Support, 9th Edition
Connect To a Wireless WAN (Cellular) Network • How to connect to a cellular network: • Using an embedded broadband modem: insert the SIM card provided by your mobile operator • Also need to use software either provided by your OS or your mobile operator • Tether your cell phone: install software provided by mobile operator and tether your phone to your computer • Using a USB broadband modem: Ensure SIM card is inserted in the device then insert the modem into a USB port • Windows finds the device and software installed on the device automatically runs A+ Guide to IT Technical Support, 9th Edition
Create A Dial-Up Connection • Bare-bones installation steps • Install internal or external dial-up modem • Plug phone line into computer modem port and wall jack • Open Network and Sharing Center window, click Set up a connection or network, select Connect to the Internet - Set up a broadband or dial-up connection, click Next • Click Dial-up, enter ISP information, click Create A+ Guide to IT Technical Support, 9th Edition
Create A Dial-Up Connection • To use the connection • Go to Network and Sharing Center • Select dial-up connection, click Connect, click Dial • You will hear modem dial up the ISP and make the connection A+ Guide to IT Technical Support, 9th Edition
Create A Dial-Up Connection • Troubleshooting tips: • Verify phone line and modem are working • Check Dial-up Connection Properties box for errors • Dial the number manually from a phone • Listen for number being dialed • Remove and reinstall dial-up connection A+ Guide to IT Technical Support, 9th Edition
Create A VPN Connection • Virtual private network (VPN):used by remote employees to connect to a corporate network by way of the Internet • Data is encrypted using a technique called a tunnel or tunneling • The VPN is often managed by client/server software • Windows can be used to create a VPN connection instead of third-party software • VPN connection is a virtual connection • Setting up a tunnel over an existing connection A+ Guide to IT Technical Support, 9th Edition
Create A VPN Connection • General steps to connect to VPN using Windows: • 1. In Network and Sharing Center, click Set up a new connection or network, click Connect to a workplace – Set up a dial-up or VPN connection to your workplace, click Next • In the Connect to a Workplace box, click Use my Internet connection (VPN),enter IP address or domain name of the network, name the VPN connection and click Create A+ Guide to IT Technical Support, 9th Edition
Dynamic and Static Configurations • To configure dynamic and static IP addresses: • Open Network Connections window, right-click network connection and select Properties • On properties box, click Networking tab • Select TCP/IPv4 and click Properties • Default setting is dynamic IP addressing • To change to static select Use the following IP address • Enter IP address, subnet mask, and default gateway A+ Guide to IT Technical Support, 9th Edition